Mais conteúdo relacionado

Apresentações para você(20)



cybersecurity and cyber crime

  1. The Internet-Cybersecurity and Crime Made By-Darshan Aswani Class-Tc2 Subject-Computer Workshop
  2. INTRODUCTION TO CYBERSECURITY  Today cybercrime causes huge problems for society personally, financially, and even in matters of national security.  Just in the last few years, hundreds of millions of credit card numbers have been stolen, tens of millions of Social Security numbers and healthcare records were compromised.  Even nuclear centrifuges that have been hacked, and unmanned aerial drones have been hijacked.
  3.  This is all done by exploiting vulnerabilities in hardware and software or more often by taking advantage of unintentional decisions made by the people using the software.
  4.  The people committing these cyber crimes don't fit a single profile or motivation.  It could be anyone from an international terrorist to a teenager competing for bragging rights.  Today the largest countries not only have a regular army but also have a well armed cyber army.
  5. How Cyber Crime Works Now We will learn about the I. software viruses, II. denial-of-service attacks,and III. phishing scams.
  6. Software Viruses • In biology and life, a virus is an organism that is spread by coughing, sneezing, or physical contact. • Viruses work by infecting cells, injecting their genetic material, and using those cells to replicate. • They can make people really sick and then spread to other people.
  7. • A computer virus works also bit similarly. • A virus is an executable program that gets installed, usually unintentionally, and harms the user and their computer. • It's also possible for a virus to spread itself to other computers.
  8. How does a virus get on your computer? • There are a couple ways an attacker can infect someone's computer. I. They might lure a victim into installing a program with deception about the program's purpose, so for example a lot of viruses are disguised as security updates. II. It's also possible that the software on your computer has a vulnerability, so an attacker can install itself without even needing explicit permission.
  9. • Once a virus is on your computer it can 1. steal or delete any of your files 2. control other programs 3. or even allow someone else to remotely control your computer.
  10. DISTRIBUTED DENIAL OF SERVICE  Using computer viruses, hackers can take over millions of computers world wide and then use them as a digital army, otherwise known as a botnet, to attack and take down websites.  This kind of attack is called a distributed denial of service.
  11. • A denial of service is when hackers overwhelm a website with too many requests. • We call it a distributed denial-of- service when the attack comes from many computers all at once. • Most websites are ready to respond to millions of requests a day, but if you hit them with billions or trillions of requests, coming from different places, the computers are overloaded and stop responding.
  12. PHISHING SCAM Another trick used by cybercriminals is to send large amounts of spam email in an attempt to trick people into sharing sensitive personal information, This is called a phishing scam. A phishing scam is when you get what seems like a trustworthy email asking you to log into your account, but clicking the email takes you to a fake website. If you log in anyway, you've been tricked into giving your password away, Hackers can then use your login credentials to access your real accounts to steal information or maybe even to steal your money.
  13. • Fortunately there are many companies, laws, and government organizations working to make the internet safer, but these efforts are not enough. • You may think when a computer system gets hacked the problem was the security design or the software. • Ninety percent of the time the system gets hacked however, it's not because of the security bug, but because of a simple mistake made by a human.
  14. Steps we can all take to protect ourselves • Use Strong Passwords. • Check for Authentic Web Addresses. • Install System Security updates Often. • Don’t Install a software you Don’t Trust